cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Indonesian Journal of Electrical Engineering and Computer Science
ISSN : 25024752     EISSN : 25024760     DOI : -
Core Subject :
Arjuna Subject : -
Articles 9,174 Documents
VLSI Architectures for Lifting Based Discrete Wavelet Transform – A Survey M. Kalaiarasi; T. Vigneswaran
Indonesian Journal of Electrical Engineering and Computer Science Vol 3, No 2: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v3.i2.pp323-330

Abstract

Image compression is a key technology in the development of various multimedia and communication applications. Perfect reconstruction of the image without any loss in picture quality and data is very important. This can be achieved with the Discrete Wavelet Transform (DWT), which is an efficient tool for image compression and video compression. The lifting based DWT architecture has the advantage of lower computational complexities and also requires less memory compared to the conventional convolution method. The existing DWT architectures are represented in terms of folded, flipping and recursive structures. The various architectures are discussed in terms of memory, power consumption and operating frequency involved with the given size of image and required levels of decomposition. This paper presents a survey of these architectures for 2-dimensional and 3-dimensional Discrete Wavelet Transform. This study is useful for deriving an efficient method for improving the speed and hardware complexities of existing architectures.
An Improved Photovoltaic Array Configuration for Photovoltaic System in the Presence of Maximum Power Point Tracking during Partial Shading Condition K. Burhanudin; N.A. Kamarzaman; A.A.A. Samat; A.I. Tajudin; S.S. Ramli; N. Hidayat
Indonesian Journal of Electrical Engineering and Computer Science Vol 6, No 2: May 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v6.i2.pp301-309

Abstract

Power-Voltage (P-V) curve and Current-Voltage (I-V) curve determine the performance of the PV system. In this work, the arrangements of the PV module were reconstructed by adding the number of PV module in 3 strings configuration from 5 to 45. This method enhance the performance of the PV system as it able to show the characteristic of the P-V and I-V curve during partial shading and maximum irradiance despite higher number of PV panel. This study focuses on improving the PV array configuration and simulation speed of the PV panel. The simulation of small size PV array is possible, but the problem lies when the number of string and PV module used increases. New PV array configuration is flexible and easy to add string and increase the number of PV module. PV array configuration was modeled using MATLAB/SIMULINK software.
Event-Concept Pair Series Extraction to Represent Medical Complications from Texts Chaveevan Pechsiri; Sumran Phainoun
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i3.pp1320-1333

Abstract

This research aims to determine an event-concept pair series as consequent events, particularly a Cause-Effect-concept pair (called ‘CEpair’) series on disease documents downloaded from hospital-web-boards. CEpair series are used for representing medical/disease complications which benefit for Solving system. Each causative/effect event concept is expressed by a verb phrase of an elementary discourse unit (EDU) which is a simple sentence. The research has three problems; how to determine each adjacent-EDU pair having the cause-effect relation, how to determine a CEpair series mingled with non-causeeffect-relation EDUs, and how to identify the complication of several extracted CEpair series from the documents. Therefore, we extract NWordCo-concept set having the causative/effect concepts from EDUs’ verb phrases including a support vector machine to solve each NWordCo size. We apply the Naïve Bayes classifier to learn and extract an NWordCoconcept pair set as a knowledge template having the cause-effect relation from the documents. We then propose using the knowledge template to extract several CEpair series. We also apply the intersection of the NWordCo-concept sets to identify the commoncause/effect for representing the complication-development parts of the extracted-CEpair series. The research results provide the high percent correctness of the CEpair-series determination from the documents.
LTE RF receiver modeling and each part testing with MATLAB simulink Fatima Faydhe al azzawi
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1251-1257

Abstract

fourth generation cellular network based on Long Term Evaluation (LTE) air interface. LTE is specifically designed for packet data communications, where the emphasis of the technologies high spectral efficiency, high peak data rates, low latency, and frequency flexibility. In this paper a LTE physical layer design and implemented using MATLAB codes and Simulink, where MATLAB codes generate the 64 QAM transmitting signal and simulating LTE frames while Simulink model perform the physical layer which including the band limiting, free space path loss adding, channel, RF receiver, demodulation, 10-bit ADC, DC offset cancellation, saving data to preform EVM measurements, and viewing the spectrum signal after each block, finally QAM with multi –order tested under AWGN.
Power Harvesting Using Piezoelectric Shoe For External Power Storage Mohammad Saffri Mazalan; Roslina Mohamad; Murizah Kassim; Shahrani Shahbudin
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 3: March 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i3.pp655-659

Abstract

The demands for portable energy source have increased because most portable electronic device needs the extra energy throughout the day due to the user’s increase in power consumption. Hence, a piezoelectric power harvesting shoe circuit with storage mechanism capabilities is designed by using piezoelectric disc material, 1N4007 bridge rectifiers, USB cables, and an external power storage. Piezoelectric disc material of 27mm and 35 mm in size that produces AC voltage when applied pressure is embedded in shoe’ insole and the output AC voltage is converted using a bridge rectifier for each material. The output is connected to a USB cable and can be connected to the external power storage during power harvesting. Different sizes of piezoelectric disc produce different amount of voltage and are also affected by the pressure applied to it. An amount of 5V is the requirements needed to charge an external device. The 27mm disc produces a voltage of 3V to 5V depending on the pressure applied while the 35mm disc produces 4V to 6.2V. Piezoelectric disc material is an alternative way to harvest energy when embedded to a shoe with an added storage capability as it solves the problem of needing the extra energy for electronic devices.
Subjective-Objective Matching Evaluation Approach for Enhanced Dental Images Siti Arpah Ahmad; Noor Elaiza Abd Khalid; Mohd Nasir Taib; Haslina Taib
Indonesian Journal of Electrical Engineering and Computer Science Vol 12, No 1: October 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v12.i1.pp239-245

Abstract

Cases of misdiagnosis and variability evaluation among the dentists do happen. The complexity of anatomical structures and the low contrast of the original images are factors that contribute to the problems. Image enhancement is often used to enhance medical images. However, currently limited work has been done in enhancing the dental pathological features. Dentists come from different background in terms of experience, place of study, method of practices and emotional quotient. These are some of the factors that may cause differences in subjective evaluation among dentists. Therefore, this research focused on identifying objective measurements based on dentists’ subjective evaluation on abnormalities’ detection in jaw area. Objective measurement is based on contrast improvement index (CII) and subjective evaluation is derived from dentists’ questionnaire answering. This paper contributes to new knowledge in the initial phase of identifying dental disease characteristics by means of correlation between the subjective and objective evaluation.
Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning Rawaa Ismael Farhan; Abeer Tariq Maolood; Nidaa Flaih Hassan
Indonesian Journal of Electrical Engineering and Computer Science Vol 20, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v20.i3.pp1413-1418

Abstract

The emergence of the internet of things (IOT) as a result of the development of the communications system has made the study of cyber security more important. Day after day, attacks evolve and new attacks are emerged. Hence, network anomaly-based intrusion detection system is become very important, which plays an important role in protecting the network through early detection of attacks. Because of the development in  machine learning and the emergence of deep learning field,  and its ability to extract high-level features with high accuracy, these systems have been included to work with real network traffic CSE-CIC-IDS2018 for a wide range of intrusions and normal behavior as an ideal method of testing and evaluation. In this paper, we test and evaluate our deep model (DNN) which has achieved a good detection accuracy of about 90%.
Aromatic Herbs Classification by using Discriminant Analysis Techniques N. F.M. Radzi; A. Che Soh; A. J. Ishak; M. K. Hasan; U. K. Mohamad Yusof
Indonesian Journal of Electrical Engineering and Computer Science Vol 5, No 3: March 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v5.i3.pp530-535

Abstract

An electronic nose was used to distinguish between selected herb samples according to their family group species. This paper aims to evaluate the potential of using the electronic nose to characterize three groups of families of twelve herb species based on the discriminant analysis approach. The feature extraction involves the use of a signal processing technique that simplifies classification and yields optimal results. Two discriminant techniques:- the principal component analysis (PCA) and the multiple discriminant analysis (MDA) were used to investigate the potential to distinguish herb species between several herbs within the same family group. The results showed that the twelve herb species can be better classified using the MDA method compared to the PCA method.
Adaptive Link Aware on-demand Multicast Routing Scheme in MANET Ruban Chakravarthy; G. Ranganathan
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 1: January 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i1.pp56-59

Abstract

The main objective of this paper is to propose a new multicast routing scheme to adopt with the dynamic topology of MANET at the same time to provide high multicast efficiency and packet delivery ratio. The proposed scheme is named as Link Aware on Demand Multicast Routing (LAOMR) scheme. In this scheme, initially the source node forms the multicast group by announcing itself as a multicast source agent to all the nodes in the network. The nodes which are eager to join in the group are sending the join request to the source node. Then the source node finds the route to reach the multicast group through some intermediate nodes. The intermediate nodes are not interested to hear the multicast message but they are act as the routers to forward the packets to the multicast group. The intermediate nodes are chosen based on the link residual life (LRL) of the nodes. The node which has the highest LRL and closer to the multicast group is selected as the forwarder node. So, the proposed scheme reduces the link failure in the multicast route and increases the multicast efficiency, throughput. The performance is evaluated by using the simulation results obtained from NS2 Simulator.
The evaluation of AdBlock technique implementation for enterprise network environment Mohd Iskandar Bin Samsuddin; Mohamad Yusof Darus; Shamsul J Elias; Abidah Hj Mat Taib; Norkhushaini Awang; Roshidi Din
Indonesian Journal of Electrical Engineering and Computer Science Vol 13, No 3: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v13.i3.pp1102-1109

Abstract

This paper presents the evaluation of AdBlock technique implementation for enterprise network environment. This study has presented the impact of web browsing activities where it is the most active traffic where is consumed the highest inbound bandwidth usage in enterprise network environment. We can conclude that DNS AdBlock is the best solution for enterprise network environment in term of blocking advertisement compare to extension adblock. Adblock technique also reduce network data request by comparing front-end solution (browser extension AdBlock) at client web browser and networks level adblock. The parameters such as HTTP request, TCP connection and network bandwidth are being examined to measure the effectiveness of blocking online advertisement. Both techniques perform the reduction of traffics and bandwidth utilization. The result shows that DNS AdBlock is the most effective in blocking online advertisement using the examined parameters. DNS AdBlock can sustain the usage of web browsing activity for enterprise network and also generate substantial saving across several fonts. This study has identified current web browsing trends traffic in enterprise network where it consumed 50 percent in average. This number increased when industries are moving to cloud web-based consumption. However, industries such as educational sector, web browsing traffic is one of connectivity that enterprises network should be investing to support openness and heavy traffic from educational users.

Filter by Year

2012 2026


Filter By Issues
All Issue Vol 41, No 2: February 2026 Vol 41, No 1: January 2026 Vol 40, No 3: December 2025 Vol 40, No 2: November 2025 Vol 40, No 1: October 2025 Vol 39, No 3: September 2025 Vol 39, No 2: August 2025 Vol 39, No 1: July 2025 Vol 38, No 3: June 2025 Vol 38, No 2: May 2025 Vol 38, No 1: April 2025 Vol 37, No 3: March 2025 Vol 37, No 2: February 2025 Vol 37, No 1: January 2025 Vol 36, No 3: December 2024 Vol 36, No 2: November 2024 Vol 36, No 1: October 2024 Vol 35, No 3: September 2024 Vol 35, No 2: August 2024 Vol 35, No 1: July 2024 Vol 34, No 3: June 2024 Vol 34, No 2: May 2024 Vol 34, No 1: April 2024 Vol 33, No 3: March 2024 Vol 33, No 2: February 2024 Vol 33, No 1: January 2024 Vol 32, No 3: December 2023 Vol 32, No 1: October 2023 Vol 31, No 3: September 2023 Vol 31, No 2: August 2023 Vol 31, No 1: July 2023 Vol 30, No 3: June 2023 Vol 30, No 2: May 2023 Vol 30, No 1: April 2023 Vol 29, No 3: March 2023 Vol 29, No 2: February 2023 Vol 29, No 1: January 2023 Vol 28, No 3: December 2022 Vol 28, No 2: November 2022 Vol 28, No 1: October 2022 Vol 27, No 3: September 2022 Vol 27, No 2: August 2022 Vol 27, No 1: July 2022 Vol 26, No 3: June 2022 Vol 26, No 2: May 2022 Vol 26, No 1: April 2022 Vol 25, No 3: March 2022 Vol 25, No 2: February 2022 Vol 25, No 1: January 2022 Vol 24, No 3: December 2021 Vol 24, No 2: November 2021 Vol 24, No 1: October 2021 Vol 23, No 3: September 2021 Vol 23, No 2: August 2021 Vol 23, No 1: July 2021 Vol 22, No 3: June 2021 Vol 22, No 2: May 2021 Vol 22, No 1: April 2021 Vol 21, No 3: March 2021 Vol 21, No 2: February 2021 Vol 21, No 1: January 2021 Vol 20, No 3: December 2020 Vol 20, No 2: November 2020 Vol 20, No 1: October 2020 Vol 19, No 3: September 2020 Vol 19, No 2: August 2020 Vol 19, No 1: July 2020 Vol 18, No 3: June 2020 Vol 18, No 2: May 2020 Vol 18, No 1: April 2020 Vol 17, No 3: March 2020 Vol 17, No 2: February 2020 Vol 17, No 1: January 2020 Vol 16, No 3: December 2019 Vol 16, No 2: November 2019 Vol 16, No 1: October 2019 Vol 15, No 3: September 2019 Vol 15, No 2: August 2019 Vol 15, No 1: July 2019 Vol 14, No 3: June 2019 Vol 14, No 2: May 2019 Vol 14, No 1: April 2019 Vol 13, No 3: March 2019 Vol 13, No 2: February 2019 Vol 13, No 1: January 2019 Vol 12, No 3: December 2018 Vol 12, No 2: November 2018 Vol 12, No 1: October 2018 Vol 11, No 3: September 2018 Vol 11, No 2: August 2018 Vol 11, No 1: July 2018 Vol 10, No 3: June 2018 Vol 10, No 2: May 2018 Vol 10, No 1: April 2018 Vol 9, No 3: March 2018 Vol 9, No 2: February 2018 Vol 9, No 1: January 2018 Vol 8, No 3: December 2017 Vol 8, No 2: November 2017 Vol 8, No 1: October 2017 Vol 7, No 3: September 2017 Vol 7, No 2: August 2017 Vol 7, No 1: July 2017 Vol 6, No 3: June 2017 Vol 6, No 2: May 2017 Vol 6, No 1: April 2017 Vol 5, No 3: March 2017 Vol 5, No 2: February 2017 Vol 5, No 1: January 2017 Vol 4, No 3: December 2016 Vol 4, No 2: November 2016 Vol 4, No 1: October 2016 Vol 3, No 3: September 2016 Vol 3, No 2: August 2016 Vol 3, No 1: July 2016 Vol 2, No 3: June 2016 Vol 2, No 2: May 2016 Vol 2, No 1: April 2016 Vol 1, No 3: March 2016 Vol 1, No 2: February 2016 Vol 1, No 1: January 2016 Vol 16, No 3: December 2015 Vol 16, No 2: November 2015 Vol 16, No 1: October 2015 Vol 15, No 3: September 2015 Vol 15, No 2: August 2015 Vol 15, No 1: July 2015 Vol 14, No 3: June 2015 Vol 14, No 2: May 2015 Vol 14, No 1: April 2015 Vol 13, No 3: March 2015 Vol 13, No 2: February 2015 Vol 13, No 1: January 2015 Vol 12, No 12: December 2014 Vol 12, No 11: November 2014 Vol 12, No 10: October 2014 Vol 12, No 9: September 2014 Vol 12, No 8: August 2014 Vol 12, No 7: July 2014 Vol 12, No 6: June 2014 Vol 12, No 5: May 2014 Vol 12, No 4: April 2014 Vol 12, No 3: March 2014 Vol 12, No 2: February 2014 Vol 12, No 1: January 2014 Vol 11, No 12: December 2013 Vol 11, No 11: November 2013 Vol 11, No 10: October 2013 Vol 11, No 9: September 2013 Vol 11, No 8: August 2013 Vol 11, No 7: July 2013 Vol 11, No 6: June 2013 Vol 11, No 5: May 2013 Vol 11, No 4: April 2013 Vol 11, No 3: March 2013 Vol 11, No 2: February 2013 Vol 11, No 1: January 2013 Vol 10, No 8: December 2012 Vol 10, No 7: November 2012 Vol 10, No 6: October 2012 Vol 10, No 5: September 2012 Vol 10, No 4: August 2012 Vol 10, No 3: July 2012 More Issue